-
1
-
-
84902324719
-
Preliminary design of a platform-as-a-service to provide security in cloud
-
Casola, V., De Benedictis, A., Rak, M., Villano, U.: Preliminary design of a platform-as-a-service to provide security in cloud. In: CLOSER - Proceedings of the 4th International Conference on Cloud Computing and Services Science, Barcelona, Spain, 3–5 April, pp. 752–757 (2014)
-
(2014)
CLOSER - Proceedings of the 4Th International Conference on Cloud Computing and Services Science, Barcelona, Spain, 3–5 April
, pp. 752-757
-
-
Casola, V.1
De Benedictis, A.2
Rak, M.3
Villano, U.4
-
3
-
-
84983801984
-
Per-service security SLA: A new model for security management in clouds
-
Casola, V., De Benedictis, A., Modic, J., Rak, M., Villano, U.: Per-service security SLA: a new model for security management in clouds. In: 2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), pp. 83–88, June 2016
-
(2016)
2016 IEEE 25Th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
, pp. 83-88
-
-
Casola, V.1
De Benedictis, A.2
Modic, J.3
Rak, M.4
Villano, U.5
-
4
-
-
3042782049
-
What is computer security?
-
University of California
-
Bishop, D.M.: What is computer security? IEEE Secur. Priv. 1, 67–69 (2003). University of California
-
(2003)
IEEE Secur. Priv
, vol.1
, pp. 67-69
-
-
Bishop, D.M.1
-
5
-
-
85032265760
-
Automatically enforcing security SLAs in the cloud
-
Casola, V., De Benedictis, A., Rak, M., Modic, J., Erascu, M.: Automatically enforcing security SLAs in the cloud. IEEE Trans. Serv. Comput. (2016, preprints)
-
(2016)
IEEE Trans. Serv. Comput
-
-
Casola, V.1
De Benedictis, A.2
Rak, M.3
Modic, J.4
Erascu, M.5
-
9
-
-
84955497792
-
SLA composition in service networks
-
ACM Press, New York
-
Zappatore, M., Longo, A., Bochicchio, M.A.: SLA composition in service networks. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing - SAC 2015, pp. 1219–1224. ACM Press, New York (2015). http://dl.acm.org/citation. cfm?doid=2695664.2699490
-
(2015)
Proceedings of the 30Th Annual ACM Symposium on Applied Computing - SAC 2015
, pp. 1219-1224
-
-
Zappatore, M.1
Longo, A.2
Bochicchio, M.A.3
-
10
-
-
84919799134
-
SLA-guided data integration on cloud environments
-
Bennani, N., Guegan, C., Musicante, M., Solar, G.: SLA-guided data integration on cloud environments. In: IEEE International Conference on Cloud Computing, CLOUD, pp. 934–935 (2014). http://www. scopus.com/inward/record.url?eid=2-s2.0-84919799134&partnerID=40& md5=ca5042e7d0fe0b96389d1cc764acd78c
-
(2014)
IEEE International Conference on Cloud Computing, CLOUD
, pp. 934-935
-
-
Bennani, N.1
Guegan, C.2
Musicante, M.3
Solar, G.4
-
11
-
-
84962091253
-
-
Constraint no. 2
-
Bennani, N., Ghedira-Guegan, C., Vargas-Solar, G., Musicante, M.A.: Towards a secure database integration using SLA in a multi-cloud context. Constraint no. 2 (2015)
-
(2015)
Towards a Secure Database Integration Using SLA in a Multi-Cloud Context.
-
-
Bennani, N.1
Ghedira-Guegan, C.2
Vargas-Solar, G.3
Musicante, M.A.4
-
12
-
-
51749120335
-
Security policy composition for composite services
-
IEEE, July
-
Satoh, F., Tokuda, T.: Security policy composition for composite services. In: 2008 Eighth International Conference on Web Engineering, pp. 86–97. IEEE, July 2008. http://ieeexplore.ieee.org/document/4577872/
-
(2008)
2008 Eighth International Conference on Web Engineering
, pp. 86-97
-
-
Satoh, F.1
Tokuda, T.2
-
13
-
-
81455142679
-
Security policy composition for composite web services
-
Satoh, F., Tokuda, T.: Security policy composition for composite web services. IEEE Trans. Serv. Comput. 4(4), 314–327 (2011). http://ieeexplore.ieee.org/document/5560635/
-
(2011)
IEEE Trans. Serv. Comput
, vol.4
, Issue.4
, pp. 314-327
-
-
Satoh, F.1
Tokuda, T.2
-
14
-
-
34547271784
-
Defeasible security policy composition for web services
-
Lee, A.J., Boyer, J.P., Olson, L.E., Gunter, C.A.: Defeasible security policy composition for web services. In: Proceedings of the Fourth ACM Workshop on Formal Methods in Security - FMSE 2006, pp. 45–54 (2006). http://portal.acm.org/citation.cfm?doid=1180337.1180342
-
(2006)
Proceedings of the Fourth ACM Workshop on Formal Methods in Security - FMSE 2006
, pp. 45-54
-
-
Lee, A.J.1
Boyer, J.P.2
Olson, L.E.3
Gunter, C.A.4
-
15
-
-
85019263577
-
-
Errico, M.D., Malmignati, F., Andreotti, G.F.: A platform for secure and trustworthy service composition, pp. 67–72 (2014)
-
(2014)
A Platform for Secure and Trustworthy Service Composition
, pp. 67-72
-
-
Errico, M.D.1
Malmignati, F.2
Reotti, G.F.3
-
16
-
-
84881056857
-
A compose language-based framework for secure service composition
-
IEEE, December 2012
-
Zhou, B., Llewellyn-Jones, D., Shi, Q., Asim, M., Merabti, M., Lamb, D.: A compose language-based framework for secure service composition. In: 2012 International Conference on Cyber Security, SocialInformatics, pp. 195–202. IEEE, December 2012. http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm? arnumber=6542544ieeexplore.ieee.org/document/6542544/
-
2012 International Conference on Cyber Security, Socialinformatics
, pp. 195-202
-
-
Zhou, B.1
Llewellyn-Jones, D.2
Shi, Q.3
Asim, M.4
Merabti, M.5
Lamb, D.6
-
17
-
-
84863490553
-
HiPoLDS: A security policy language for distributed systems
-
Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds.) WISTP 2012, Springer, Heidelberg
-
Dell’Amico, M., Serme, G., Idrees, M.S., de Olivera, A.S., Roudier, Y.: HiPoLDS: a security policy language for distributed systems. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 97–112. Springer, Heidelberg (2012). doi:10.1007/978-3-642-30955-7 10
-
(2012)
LNCS
, vol.7322
, pp. 97-112
-
-
Dell’Amico, M.1
Serme, G.2
Idrees, M.S.3
De Olivera, A.S.4
Roudier, Y.5
-
18
-
-
47849093579
-
Security assurance aggregation for IT infrastructures
-
Pham, N., Riguidel, M.: Security assurance aggregation for IT infrastructures. In: ICSNC, pp. 37–39 (2007)
-
(2007)
ICSNC
, pp. 37-39
-
-
Pham, N.1
Riguidel, M.2
|